Thank you for visiting Cyber Matters.  In this blog we aim to discuss issues relating to cyber security, with brief articles, that don’t get carried away with too much technical detail.
Binary Back
We operate in an industry in which there is a lot of over hyped nonsense discussed, as well as some really important issues.  In Cyber Matters we aim to cut through this and get straight to the point in an easy to understand way.   Our bloggers are free to talk about any area relating to Cyber Security, Computer Security, Information Security or what ever term you prefer to use.

We welcome your views – please contribute to the discussion by way of comments on our articles.

Recent Posts

Featured Posts

  • Cyber Immunology - Tomorrow will mark a major milestone for Cyber Matters.  Dr. Julie Greensmith has kindly agreed to provide a blog series on her exciting research into Cyber Immunology at the University of Nottingham.
  • How do you evaluate an Information Exchange Gateway solution? - How do you evaluate an Information Exchange Gateway solution? I’ve blogged previously on Cyber Matters about how Information Exchange Gateways (IEGs) need to be built in a flexible manner to meet a variety of customer requirements. The other big question from potential customers is how do they know that they can trust a solution?
  • The Secure Internet of Things - The Internet of Things (IoT) is big news at the moment, being used as a title for just about everything that interacts with the internet, be it man or machine. In some areas the commentary is just starting to recognise that security and privacy are issues. And as you expect, various players are putting forward […]
  • No, Shellshock does not defeat SELinux - A week is a long time in Cyber Security. These past few weeks you may have heard about the latest ‘big vulnerability’, dubbed ShellShock. If you haven’t, or want more information on it, I direct you to the best authority I know: Wikipedia.
  • Diodes are Diodes, Guards are Guards - Over the last 3-5 years Data Diodes have grown in popularity as a solution for moving data between isolated networks. With this has come creative marketing to leverage the term ‘Diode’ for solutions that are anything but. Let’s just take a few moments to revise some of the fundamental modes of secure information exchange.
  • Booting Linux Securely - A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning Tree report observed: Of those, Linux got the best overall score The report then looked at the criteria used to […]
  • A Brief Introduction into Threat Analysis - The purpose of this blog piece is to introduce the concept of threat analysis, what it is and why it’s a good idea, while at the same time present a simple and effective way to try it yourself.  It is part of a blog series on the development approach at Nexor.

Get every new post delivered to your Inbox.

Join 690 other followers